Search For:

Displaying 1-50 out of 99 total
Research on Relation Models of Unexpected Events Oriented to Emergency Decision Support
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Xuehua Wang, Dong Wang, Peng Zhang, Xin Ye, Ning Wang
Issue Date:September 2009
pp. 369-372
Inheritance relation model, Causal relation model and Reachable relation models are studied. These models can be applied in emergency information’s construction, data extraction and navigation of the disaster chain.
 
Study on the Authorization Management Model Based on Organization in E-government
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Zhang Peng, Wang Yanzhang, Wang Dong, Dong Yanjie, Wang Ning
Issue Date:December 2008
pp. 227-230
E-government is an important way to enhance the administration and the public service. With the analysis of Chinese government’s organizations and positions, the paper proposes an authorization management model based on organization which faces the integra...
 
Formal Description of the Cognitive Process of Decision Making
Found in: Cognitive Informatics, IEEE International Conference on
By Yingxu Wang, Dong Liu, Guenther Ruhe
Issue Date:August 2004
pp. 124-130
<p>Decision making is one of the basic cognitive processes of human behaviors by which a preferred option or a course of actions is chosen from among a set of alternatives based on certain criteria. Decision theories are widely applied in a number of...
 
Hydrologic Characteristics Analysis of Monthly Runoff Series in Lower Yellow River
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Song Shengli, Wang Dong, Wu Jichun, Zhu Qingping, Wang Ling
Issue Date:October 2010
pp. 232-235
Taking the 34 years (1970~2003) monthly runoff series and annual runoff series obtained from Lijin station and Huayuankou station as the basic data, the wavelet analysis (WA) method and the self-organized map (SOM) were used to establish a WA-SOM coupling ...
 
Protection Routing Algorithm Based on Survivable Integrated Auxiliary Graph in Waveband Switching Optical Networks
Found in: Future Generation Communication and Networking
By Lei Guo, Xingwei Wang, Dong Wang, Cunqian Yu, Weigang Hou, Ying Li, Chongshan Wang
Issue Date:December 2008
pp. 130-133
In this paper, we propose a new heuristic algorithm, Protection based on Survivable Integrated Auxiliary Graph (PSIAG), to tolerate the single-link failure in waveband switching optical networks. The Survivable Integrated Auxiliary Graph (SIAG) contains si...
 
Hardware/Software Co-Simulation for Last Level Cache Exploration
Found in: Networking, Architecture, and Storage, International Conference on
By Tao Wang, Qigang Wang, Dong Liu, Michael Liao, Kevin Wang, Lu Cao, Li Zhao, Ravi Iyer, Ramesh Illikkal, Liang Wang, John Du
Issue Date:July 2009
pp. 371-378
Larger last level caches are being considered for bridging the performance gap between the processors and the memory subsystem. It requires much longer simulation time to exercise the whole cache and get accurate evaluation results. In this paper, we motiv...
 
Software-Based Detecting and Recovering from ECC-Memory Faults
Found in: Intelligent Networking and Collaborative Systems, International Conference on
By Xingjun Zhang,Endong Wang,Dong Zhang,Yu Wang,Weiguo Wu,Xiaoshe Dong
Issue Date:December 2011
pp. 715-719
According to the problem that the ECC cannot correct the multibit error in ECC memory, this paper proposes a memory error processing method on software level. On the foundation of revising the Linux kernel code, the method can discover this area of influen...
 
A Bayesian Approach to Clustering Matting Components in Spectral Matting
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Ge Wang,Liang-Hao Wang,Dong-Xiao Li,Ming Zhang
Issue Date:July 2013
pp. 287-290
This paper proposes to apply Bayesian principle to clustering matting components in spectral matting. Spectral matting is a useful and effective technique for digital image matting. A crucial issue of spectral matting is how to cluster the computed matting...
 
A Massively Parallel Approach for Nonlinear Interdependency Analysis of Multivariate Signals with GPGPU
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Dan Chen,Lizhe Wang,Dong Cui,Dongchuan Lu,Xiaoli Li,Samee U. Khan,Joanna Kolodziej
Issue Date:May 2012
pp. 1971-1978
Nonlinear interdependency (NLI) analysis is an effective method for measurement of synchronization among brain regions, which is an important feature of normal and abnormal brain functions. But its application in practice has long been largely hampered by ...
 
S/DC: A storage and energy efficient data prefetcher
Found in: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)
By Xianglei Dang, Xiaoyin Wang, Dong Tong, Junlin Lu, Jiangfang Yi, Keyi Wang
Issue Date:March 2012
pp. 461-466
Energy efficiency is becoming a major constraint in processor designs. Every component of the processor should be reconsidered to reduce wasted energy and area. Prefetching is an important technique for tolerating memory latency. Prefetcher designs have im...
 
Experimental Study of Non-thermal Plasma Injection System Converting NOx in Simulated Diesel Emissions
Found in: Optoelectronics and Image Processing, International Conference on
By Jing Wang, Yixi Cai, Jun Wang, Dongli Ran
Issue Date:November 2010
pp. 534-537
In order to study the removal effect of non-thermal plasma (NTP) after-treatment system on diesel engine harmful emissions, a dielectric barrier discharge (DBD) plasma reactor is designed, and the NOx removal effect is studied under the conditions of diffe...
 
The Government's Behavior Analysis of MICE Industry Development in Chongqing
Found in: International Conference on E-Business and E-Government
By Tian Shu-qin,Wang Dong-qiang
Issue Date:May 2010
pp. 4827-4830
The MICE industry, tourism and real estate are called the three pillar industries of urban development. The MICE industry is the first choice for urban development around the world. In China, the MICE industry is still at the initial stage, so it can’t dev...
 
Experimental Study on RFID Performance Factors of Conveyor Belt System Using DOE Methodology
Found in: Future Networks, International Conference on
By Xing Wang, Dong Wang
Issue Date:January 2010
pp. 139-143
This paper investigates how the performance factors affect RFID (Radio Frequency Identification) system performance. We focus on the following parameters: tag placement, angle of reader antenna and conveyor speed. We use commercial RFID reader and tags in ...
 
A New Model Based on Improved ACA and BP to Predict Silicon Content in Hot Metal
Found in: Computer Modeling and Simulation, International Conference on
By Li Wang, Dong-qing Wang, Jia-jun Zhu, Xiang Zhao
Issue Date:January 2010
pp. 364-368
A new model based on improved ant colony algorithm (ACA) and Back-propagation (BP) is proposed to predict Silicon content of hot metal in blast furnace. BP algorithm has been widely used in training artificial neural network (ANN), which is an outstanding ...
 
A Clustering and Routing Algorithm with Combination Weight for Energy Consumption Balance of WSNs
Found in: Multimedia Information Networking and Security, International Conference on
By Jin-rong Zhang, Yue Wang, Dong Wang, Jing Han
Issue Date:November 2009
pp. 230-233
As sensor nodes are typically powered by non-renewable batteries, energy efficiency is a critical factor in wireless sensor networks (WSNs). And prolonging the lifetime for nodes and the total network is a critical issue. In this paper, a combination weigh...
 
Capacitive Silicon Micro-accelerometer's Noise Reduction Technology Research
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wang Ling, Li Yan, Wang Dong
Issue Date:October 2009
pp. 553-556
The capacitive silicon micro-accelerometer as an important inertia device, applied in the autocar, consumer electronics, inertial guidance and so on, which has a wide application prospect. Improving the detection accuracy of capacitive accelerometer has be...
 
Research on the Priority-Based Soft Real-Time Task Scheduling in TinyOS
Found in: Information Technology and Computer Science, International Conference on
By Yan Zhao, Qianping Wang, Wei Wang, Dong Jiang, Yiwen Liu
Issue Date:July 2009
pp. 562-565
TinyOS [1] is an open-source operating system, using Component Description Language NesC[2] for development. TinyOS is designed mostly for wireless sensor network, in which nodes have very limited resources. A representative scheduling mechanism in TinyOS ...
 
Fast Anti-Collision Algorithms in RFID Systems
Found in: Mobile Ubiquitous Computing, Systems, Services and Technologies, International Conference on
By Jianwei Wang, Dong Wang, Yuping Zhao, Timo. Korhonen
Issue Date:November 2007
pp. 75-80
Tag anti-collision for RFID system is a significant issue for fast tag identification. This paper presents two novel fast tag anti-collision algorithms called DJ (Detection and Jump) and EDJ (Extended Detection and Jump) algorithm, which split the tag read...
 
Decentralized Utilization Control in Distributed Real-Time Systems
Found in: Real-Time Systems Symposium, IEEE International
By Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon Koutsoukos
Issue Date:December 2005
pp. 133-142
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distributed real-time systems with highly unpredictable workloads and a large number o...
 
Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-dimensional Space
Found in: IEEE Transactions on Knowledge and Data Engineering
By Zhi-Jie Wang,Dong-Hua Wang,Bin Yao,Minyi Guo
Issue Date:August 2014
pp. 1
Probabilistic range query (PRQ) over uncertain moving objects has attracted much attentions in recent years. Most of existing works focus on the PRQ for objects moving freely in two-dimensional (2D) space. In contrast, this paper studies the PRQ over objec...
 
A Review of Research Status on LVRT Technology in Doubly-fed Wind Turbine Generator System
Found in: Electrical and Control Engineering, International Conference on
By Yun Wang, Dong-li Zhao, Bin Zhao, Hong-hua Xu
Issue Date:June 2010
pp. 4948-4953
This paper gave a detailed introduction and analysis on the research status and industrialization situation of current LVRT Technology in doubly-fed wind turbine generator (WTG) system. Starting with the urgency of LVRT research in China, the paper introdu...
 
Hyperion Hyperspectral Remote Sensing Application in Altered Mineral Mapping in East Kunlun of the Qinghai-Tibet Plateau
Found in: Challenges in Environmental Science and Computer Engineering
By Bi Xiaojia, Miao Fang, Wu Bin, Li Jiaguang, Wang Dong
Issue Date:March 2010
pp. 519-523
The paper introduced the application of Hyperspectral Remote Sensing (HRS) technology, using EO-1 Hyperion Hyperspectral Remote Sensing image data of ZhongYang Mountains in the East Kunlun of Qinghai-Tibet plateau altered mineral mapping areas, described t...
 
A Study of Providing Statistical QoS in a Differentiated Sevices Network
Found in: Network Computing and Applications, IEEE International Symposium on
By Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Issue Date:April 2003
pp. 297
In this paper, we propose and analyze a methodology for providing statistical guarantees within the diffserv model in a network, that uses static-priority schedulers. We extend the previous work on statistical delay analysis and develop a method that can b...
 
Online and Intelligent Route Decision-Making from the Public Health DataSet
Found in: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Xingyun Geng,Li Wang,Dong Zhou,Huiqun Wu,Wen Cao,Yuanpeng Zhang,Yalan Chen,Weijia Lu,Kui Jiang,Jiancheng Dong
Issue Date:October 2012
pp. 453-456
From 2009, Ministry of Health in China continues to develop and promote the construction of the residents' electronic health records. The corresponding standards were pronounced by the Ministry of Health. Under the national standards, we developed a reside...
 
Data Extrapolation in Social Sensing for Disaster Response
Found in: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Siyu Gu,Chenji Pan,Hengchang Liu,Shen Li,Shaohan Hu,Lu Su,Shiguang Wang,Dong Wang,Tanvir Amin,Ramesh Govindan,Charu Aggarwal,Raghu Ganti,Mudhakar Srivatsa,Amotz Barnoy,Peter Terlecky,Tarek Abdelzaher
Issue Date:May 2014
pp. 119-126
This paper complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. Unlike trend-extrapolation methods, we focus on prediction in disaster scenar...
 
Numerical Analysis of Coupled Fluid -- Mechanical and Drainage Consolidation of Soft Soil
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Ruan Yongfen,Tan Guihua,Wu Yonghong,Wang Dong
Issue Date:January 2013
pp. 733-736
Based on solid-fluid interaction theory, a 3D model of the drainage wells with depth 10m, width 15m and radius 25m is established. The model is then used to carry out the performance analysis of drainage consolidation of saturated soft soil. Using this mod...
 
Two New Weight Initialization Strategies of LMS Adaptive Linear Equalizer in Underwater Acoustic Communication
Found in: Intelligent Systems, WRI Global Congress on
By Jing Wang, Dong Fang, Haining Huang, Jing Guan
Issue Date:December 2010
pp. 303-307
Underwater acoustic (UWA) communication is a cross subject of the communication technology and underwater acoustic signal processing technology, which is very valuable in military and civil applications. But the multipath effect of UWA channel leads to int...
 
Research and Application of Pressure Sensitive Fingerprint Acquisition System
Found in: Networking and Distributed Computing, International Conference on
By Huang Jing, Wang Dong
Issue Date:October 2010
pp. 57-59
This paper designs a complete fingerprint acquisition system which uses new-style of pressure sensitive fingerprint sensor chip BLP100 and fingerprint control chip BCT100. The system has characteristics of simple structure, fast capturing speed, high quali...
 
An Adaptive Synchronization of a Chaotic System with Unknown Parameters
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Xiaoming Liu, Zhicai Xiao, Wang Dong, Junwei Lei
Issue Date:November 2009
pp. 309-313
The sign of unknown input coefficients is assumed to be known in most papers about the input uncertainties. In this paper, a Nussbaum gain method is adopted to cope with the situation that both the sign and the value of input are unknown. And the unknown p...
 
Particle Swarm Optimization Based on Self-adaptive Acceleration Factors
Found in: Genetic and Evolutionary Computing, International Conference on
By Gai-yun Wang, Dong-xue Han
Issue Date:October 2009
pp. 637-640
The particle swarm optimization (PSO), which goes right after Ant Colony Algorithm, is another new swarm intelligence algorithm. PSO has the same drawbacks as other optimization algorithms in spite of its predominance in some fields. That is easily falling...
 
Comparative Study of Some Improved ANN-Models for Hydrologic Time Series Forecast
Found in: Intelligent Systems, WRI Global Congress on
By Sang Yanfang, Wang Dong, Wu Jichun
Issue Date:May 2009
pp. 63-67
In this paper, by taking two real hydrologic series for examples, the performances of some improved ANN-models (including BPNN, gda-BPNN, gdm-BPNN, gdx-BPNN, LM-BPNN, WANN and WNN) have been discussed and compared. Analysis results show that: 1) Among all ...
 
An Early Fire Image Detection and Identification Algorithm Based on DFBIR Model
Found in: Computer Science and Information Engineering, World Congress on
By Chen Jun, Du Yang, Wang Dong
Issue Date:April 2009
pp. 229-232
An algorithm of early fire image detection and identification based on Discrete Fractal Brownian Incremental Random Field model (DFBIR) is proposed in this paper. The flame color brightness and motion clues are chosen as the imprint of the fire image. At f...
 
A Cross-layer Relay Selection Algorithm for Infrastructure-Based Two-hop Relay Networks
Found in: Communication Software and Networks, International Conference on
By Huan Zhang, Wenbo Wang, Dong Liang, Mugen Peng
Issue Date:February 2009
pp. 77-81
Relay selection is a key issue in multihop relay networks. This paper proposes a cross-layer design relay selection algorithm for the infrastructure-based two-hop relay networks by introducing a novel utility function as the relay selection criterion. The ...
 
Dynamic Image Processing for Visual Robot Cutting Steel Plate
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Tao Liu, Yi Zheng, Zong-yi Wang, Dong-yan Li
Issue Date:December 2008
pp. 716-720
When intelligent robot with visual guiding is cutting steel plates, the reflection interference from the captured images is possibly leading to the failure of tracking, and therefore the image processing and analysis methods is require of high robustness. ...
 
Evaluation for University Laboratories Based on LMBP
Found in: Computer Science and Information Technology, International Conference on
By Xiu-Mei Wang,Dong-Xiao Niu,Chong Gao
Issue Date:September 2008
pp. 850-854
To build laboratories better, it is necessary to evaluate them reasonably. In this paper, we classed laboratories into three grades, construct evaluation model based on Levenberg-Marquardt neural network arithmetic, and using this model to evaluate laborat...
 
DEUCON: Decentralized End-to-End Utilization Control for Distributed Real-Time Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon Koutsoukos
Issue Date:July 2007
pp. 996-1009
<p><b>Abstract</b>—Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distributed real-time systems with highly unpredi...
 
A Hybrid Heuristic Approach for Disassembly/Recycle Applications
Found in: Intelligent Systems Design and Applications, International Conference on
By Hui Wang, Dong Xiang, Guanghong Duan, Jie Song
Issue Date:October 2006
pp. 985-995
<p>Over the past several years, heuristic methods are often used to find optimal solution(s) of disassembly/recycle sequencing problem, for it is a NP-hard combinatorial optimization problem.</p> <p>In the proposed research, first, we pre...
 
Partial discharge location by cross-talk phenomena between three phase stator coils of generators
Found in: International Symposium on Electrical Insulating Materials
By YangChun Cheng, ChengRong Li, Wei Wang, Dong Liu
Issue Date:June 2005
pp. 506-509 Vol. 2
Online detecting PD of the stator insulation of generators is a good way to find some primary defects. But there are many kinds of pulse noises must be eliminated. In this paper, cross-talk phenomenon among the three phases of stator coils is described. A ...
 
A Light-weight, Temporary File System for Large-scale Web Servers
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Jun Wang, Dong Li
Issue Date:October 2003
pp. 96
Several recent studies have pointed out that file I/Os can be a major performance bottleneck for some large Web servers. Large I/O buffer caches often do not work effectively for large servers. This paper presents a novel, light-weight, Temporary File Syst...
 
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Issue Date:June 2001
pp. 0127
Abstract: In this paper, we propose and analyze a methodology for providing absolute differentiated services with statistical performance guarantees for real-time applications in networks that use static-priority schedulers. We extend previous work on dela...
 
A Practical Method to Measure Parameters of Lenticular-Lens Sheet for 3DLCD
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Dong-Ning Zang,Liang-Hao Wang,Dong-Xiao Li,Ming Zhang
Issue Date:July 2013
pp. 748-752
Nowadays, with the rapid development of tereoscopic display technology, grating has been more and more widely used in auto stereoscopic 3DTV. This paper introduces a method that can be used to measure the parameters of lenticular-lens sheet for 3DLCD. This...
 
XINS: the anatomy of an indoor positioning and navigation architecture
Found in: Proceedings of the 1st international workshop on Mobile location-based service (MLBS '11)
By Chengu Wang, Dong Wang, Edward Y. Chang, Faen Zhang, Guanfeng Li, Hang Qu, Pei Dong, Qingxuan Yang, Yuan Gao
Issue Date:September 2011
pp. 41-50
Location-Based Service (LBS) is becoming a ubiquitous technology for mobile devices. In this work, we propose a signal-fusion architecture called XINS to perform effective indoor positioning and navigation. XINS uses signals from inertial navigation units ...
     
TOF Depth Map Super-resolution Using Compressive Sensing
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Li-Wei Liu,Yang Li,Liang-Hao Wang,Dong-Xiao Li,Ming Zhang
Issue Date:July 2013
pp. 135-138
Although Time-of-Flight (TOF) camera can provide real-time depth information from a real scene, the resolution of depth map captured by TOF camera is rather limited compared to HD color cameras, and thus it cannot be directly used in 3D reconstruction. In ...
 
A Real-Time Full HD 2D-to-3D Video Conversion System Based on FPGA
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Shao-Jun Yao,Liang-Hao Wang,Dong-Xiao Li,Ming Zhang
Issue Date:July 2013
pp. 774-778
The 2D to 3D conversion technique plays an important role in the development and promotion of three-dimensional television (3DTV), because it can provide adequate supply of high-quality 3D program content. This Paper focuses on the real-time implementation...
 
Android Malware Detection via a Latent Network Behavior Analysis
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Te-En Wei,Ching-Hao Mao,Albert B. Jeng,Hahn-Ming Lee,Horng-Tzer Wang,Dong-Jie Wu
Issue Date:June 2012
pp. 1251-1258
The rapid growth of smartphones has lead to a renaissance for mobile application services. Android and iOS now as the most popular smartphone platforms offer a public marketplace respectively, the Android Market and App Store- but operate with dramatically...
 
Robot Navigation System with RFID and Sensors
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Shi Peng,Wang Dong
Issue Date:March 2012
pp. 610-612
The paper proposed a method enable robot to navigate in indoor space is indicated. The system use RFID tags as landmarks to locate the robot. A topological map corresponding to the real environment is used for robot navigation. The robot goes along the way...
 
Application of a Capture Technique to the 3D Harbor Construction
Found in: Computer Science and Electronics Engineering, International Conference on
By D.C. Lo,Zi-Yao Wang,Dong-Taur Su
Issue Date:March 2012
pp. 113-117
The main purpose of this paper is to design an innovative ship handling simulation program by combining the development of Quest3D software and the Google earth harbor terrain software. The paper describes the usage of the Google earth program to retrieve ...
 
Formalizing the Structure and Behaviour of Context-Aware Systems in Bigraphs
Found in: Software and Network Engineering, ACIS International Symposium on
By Ju-Shu Wang,Dong Xu,Zhou Lei
Issue Date:December 2011
pp. 89-94
Context-aware Computing has been one of the important aspects of Ubiquitous Computing, Cloud Computing, Cyber-physical Systems, etc., recently. To date, very few works can be found on formal approaches for this area. Bigraph and its related theories are in...
 
Identifying Protein Complexes from PPI Networks Using GO Semantic Similarity
Found in: Bioinformatics and Biomedicine, IEEE International Conference on
By Jian Wang,Dong Xie,Hongfei Lin,Zhihao Yang,Yijia Zhang
Issue Date:November 2011
pp. 582-585
Protein complexes play a key role in many biological processes. Various computational approaches have been developed to identify complexes from protein-protein interaction (PPI) networks. However, high false-positive rate of PPIs makes the identification c...
 
Simulating Supply Chain Activities and Providing RFID Event Data for Test
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Jin Qi,Ren Zheng,Wang Dong
Issue Date:November 2011
pp. 438-441
With RFID technology, a traditional supply chain could gain considerable improvement on its efficiency. However, applications based on RFID should be thoroughly tested before deployment. Building a RFID-enhanced supply chain environment could be costly, es...
 
 1  2 Next >>